Nothing Special   »   [go: up one dir, main page]

Hayikader et al., 2016 - Google Patents

Issues and security measures of mobile banking apps

Hayikader et al., 2016

View PDF
Document ID
13405357404393606837
Author
Hayikader S
Hadi F
Ibrahim J
Publication year
Publication venue
International Journal of Scientific and Research Publications

External Links

Snippet

Mobile apps is a used to designate the act or process by which application software is developed for handheld devices, such as personal digital assistants or mobile phones. These applications can be pre-installed on phones during manufacturing platforms, or …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Badotra et al. A systematic review on security of E-commerce systems
Thakur et al. Cloud computing and its security issues
US10397187B2 (en) Blocking automated attacks with forced user interaction
Hayikader et al. Issues and security measures of mobile banking apps
Alsayed et al. E-banking security: Internet hacking, phishing attacks, analysis and prevention of fraudulent activities
Kaushik et al. Security and privacy in IoT based e-business and retail
Yoo et al. Case study of the vulnerability of OTP implemented in internet banking systems of South Korea
He et al. Examining Security Risks of Mobile Banking Applications through Blog Mining.
Wright et al. Cyber security and mobile threats: The need for antivirus applications for smart phones
Briones et al. Review of the main security problems with multi-agent systems used in e-commerce applications
Hyslip Cybercrime-as-a-service operations
Bosamia Mobile wallet payments recent potential threats and vulnerabilities with its possible security measures
Urs SECURITY ISSUES AND SOLUTIONS IN E-PAYMENT SYSTEMS.
Ojugo et al. Social engineering detection model for mobile smartphone clients
Nwogu et al. Security issues analysis on online banking implementations in Nigeria
Afaq et al. A critical analysis of cyber threats and their global impact
Sarjiyus et al. Improved online security framework for e-banking services in Nigeria: A real world perspective
Hossain et al. Classifying cyberattacks on financial organizations based on publicly available deep web dataset
Saha et al. Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Ngalo et al. Threat analysis of software agents in online banking and payments
Ghazizadeh et al. Secure OpenID authentication model by using Trusted Computing
Abdulla et al. Consumer use of E-banking in Iraq: Security breaches and offered solution
Daswani et al. Technology defenses to fight the root causes of breach: Part One
Williams et al. Follow the Money Through Apple Pay